Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
OpenStack Cloud Computing is not a tutorial on using OpenStack. It is an introduction to building a cloud based on OpenStack technologies. OpenStack includes a large set of modular and extensible components with broad industry support. Enterprises and service providers alike can use these programs and services to improve the efficiency, agility, security, quality and usability of their data center operations. These benefits are not free. Someone will have the responsibility to evaluate, design and implement the technology. They will need to select the services they require, choose from the myriad configuration options and incorporate the necessary plugins. The architects must ensure that they not only cover the basic functions, such as compute, storage and networking, but also integrate them into the existing infrastructure and address key topics like administration, billing, confidentiality, availability and scalability. This book introduces the reader to some of the primary challenges and suggests how to address them in an environment based on OpenStack.
Cloud Computing Protected describes the most important security challenges that organizations face as they seek to adopt public cloud services and implement their own cloud-based infrastructure. There is no question that these emerging technologies introduce new risks: Virtualization hinders monitoring and can lead to server sprawl. Multi-tenancy exposes risks of data leakage to co-tenants. Outsourcing reduces both control and visibility over services and data. Internet service delivery increases the exposure of valuable information assets. Ambiguity in jurisdiction and national regulations complicates regulatory compliance. Lack of standardization can lead to a lock-in binding customers to their providers. Fortunately, there are also many security benefits that customers can enjoy as they implement cloud services: Highly specialized providers have the economy of scale to invest in best-in-class tools and expertise. Contractual terms can clearly define the function and scope of critical services. Public services receive unprecedented scrutiny from the collective worldwide community. It is possible to achieve unlimited levels of redundancy by subscribing to multiple providers. The global reach of the Internet and security specialists facilitates early alerts and drives consistent policy enforcement. This book looks at these and other areas where the advent of cloud computing has the opportunity to influence security risks, safeguards and processes.
Cloud Computing Architected describes the essential components of a cloud-based application and presents the architectural options that are available to create large-scale, distributed applications spanning administrative domains. The requirements of cloud computing have far-reaching implications for software engineering. Applications must be built to provide flexible and elastic services, and designed to consume functionality delivered remotely across of spectrum of reliable, and unreliable, sources. Architects need to consider the impact of scalability and multi-tenancy in terms of: -New development tools -Internet-based delivery and mobile devices -Identity federation -Fragmented services and providers -Exploding information volume -Availability and elasticity techniques -New business models and monetization strategies -Revised software development cycle -Increased operational automation This book looks at these and other areas where the advent of cloud computing has the opportunity to influence the architecture of software applications.
Cloud Computing Explained provides an overview of Cloud Computing in an enterprise environment. There is a tremendous amount of enthusiasm around cloud-based solutions and services as well as the cost-savings and flexibility that they can provide. It is imperative that all senior technologists have a solid understanding of the ramifications of cloud computing since its impact is likely to permeate the entire IT landscape. However, it is not trivial to introduce a fundamentally different service-delivery paradigm into an existing enterprise architecture. This book describes the benefits and challenges of Cloud Computing and then leads the reader through the process of assessing the suitability of a cloud-based approach for a given situation, calculating and justifying the investment that is required to transform the process or application, and then developing a solid design that considers the implementation as well as the ongoing operations and governance required to maintain the solution in a partially outsourced delivery model.
Programmer's Guide to Internet Mail will help you create and manage
network applications using powerful Internet mail, directory, and
domain name protocols and standards. It succinctly explains from a
programmer's perspective not simply the primary Internet mail
protocols but also how to use other important network protocols
such as LDAP and DNS vital to the creation of message-enabled
applications. Readers will learn how these protocols and standards
facilitate message submission, delivery and retrieval, support
directory lookup, how they interoperate, and how they together
create a framework for sophisticated networked applications.
|
You may like...
|